You are on page 1of 5

DIGITAL FORENSIC AND INVESTIGATION

STUDENT’S NAME
PROFESSOR’S NAME
DEPARTMENT’S NAME
COURSE’S NAME
DATE
DIGITAL FORENSIC AND INVESTIGATION

Contents
Question-1..................................................................................................................................1

Question-2..................................................................................................................................1

Question-3..................................................................................................................................2

References..................................................................................................................................3

1
DIGITAL FORENSIC AND INVESTIGATION

Question-1
In digital forensic password recovery is very common. Different tools are available to handle
data or systems protected by a password. Some tools are merged with digital forensic tools
like OSForencis, while others can extract files directly. Some of the tools are John the Ripper
(www.openwall.com/john), AccessData PRTK (http://accessdata.com/product-download at
the Decryption Products link), Passware (www.lostpassword.com/kit-forensic.htm), and Last
Bit (http://lastbit.com/password-recovery-methods.asp). To crack the password these tools,
use a brute-force attack or dictionary attack. In Brut force attacks every single character,
possible letters, and numbers are used. Although this tool will crack the password buts tool
requires time and power to process especially when the password is also long. On the other
that that is a dictionary attack, common words that can be found in the dictionary are tried as
passwords. Password crackers have been assessed to different language dictionaries like
Russian, English, and French. A technique that can be used includes the building of a table
that contain harsh values which contain every possible password known as a rainbow table.
While cracking the password it is important to research the encryption method which is used
by the OS or application.

Question-2
To, Vladimir Chugunov.mq.edu.au

Subject- Requesting money

Dear sir,

I am writing you this e-mail for requesting you to send some money to my overseas Nigerian
bank account. I know this is a lot to ask from you, but because of a medical emergency, I
need some money to take the treatment. As you know I had shifted to this place recently and
do not know much about this place and the expenses. As per the doctors, I have to take the
treatment as soon as possible otherwise it can cause some serious health issues. The banking
detail of my Nigerian bank account is XX22 XX33 XX34. I will pay you the money
including the charges that will be going to occur while transferring the amount to my
Nigerian bank account as soon as possible. It will be a great help from your side.

Thank you

2
DIGITAL FORENSIC AND INVESTIGATION

@students.mq.edu.au

Question-3
As employee had recently changed the password which he had recently compromised but
claims that someone else is using that again. There are different factors due to which this can
happen including risk management group testing of the integrity of individual networks and
workstations are not effectively able to manage the integrity which includes checking of
physical security, applications and the security of the operating system, people who are
assessing the vulnerabilities of different applications or OS to check the authorization is not
able to check the authorization or allows unauthentic authorization, skills needed for those
who assess the vulnerabilities and conduct risk assessment like quick response and network
intrusion detection are not available in those who are assessing this, have lack of experience.
At the time when such kind of attack was conducted, groups tend to detect the attackers by
monitoring firewall log network or automated tools are not efficient in finding out these. if
the external attack was identified, the response team is not capable of finding out the attack
and methods which was used and rejects future access to the network. Damage that causes
criminal or civil legislation was not reported by the team members. These are the different
possible consequences that can lead to using of the password by someone else even though
the password is compromised (Nelson, Phillips, Steuart, 2014).

3
DIGITAL FORENSIC AND INVESTIGATION

References
Nelson, B., Phillips, A. and Steuart, C., 2014. Guide to computer forensics and
investigations. Cengage Learning.

You might also like